Apple Data Theft Surge—Attacks Up 101%, What You Must Do Now

Forbes - Feb 9th, 2025
Open on Forbes

A significant increase in infostealer malware campaigns targeting macOS users has been reported, marking a concerning trend for Apple device owners who previously felt secure compared to Windows and Linux users. According to Palo Alto Networks Unit 42, there has been a 101% rise in such malware attacks over two quarters in 2024, primarily exploiting the native AppleScript framework to deceive users into providing sensitive information. These attacks leverage social engineering tactics, making them particularly deceptive and effective.

The implications of this surge are profound, as it challenges the perception that Apple devices are immune to such threats. Experts like Eric Schwake from Salt Security emphasize the need for vigilance and proactive security measures, noting that no operating system is completely secure. Apple advises users to mitigate risks by only installing software from trusted sources and utilizing the Privacy & Security settings on their devices. This development underscores the evolving complexity of cyber threats and the necessity for continuous awareness and adaptation in cybersecurity strategies.

Story submitted by Fairstory

RATING

7.6
Fair Story
Consider it well-founded

The article provides a well-researched and timely examination of the surge in macOS infostealer malware attacks. It draws on credible sources and presents the information clearly, making it accessible to a broad audience. However, the piece could benefit from a more balanced perspective by including additional viewpoints and a deeper exploration of the broader cybersecurity landscape. While the article effectively raises awareness of the issue, its impact could be enhanced by more detailed action-oriented advice and policy discussions. Overall, it serves as a valuable resource for readers concerned about cybersecurity, particularly those using macOS devices.

RATING DETAILS

9
Accuracy

The story accurately reports a surge in macOS infostealer malware attacks, supported by credible sources such as Palo Alto Networks Unit 42, which noted a 101% increase in these attacks. The mention of specific malware types like Atomic Stealer, Poseidon Stealer, and Cthulhu Stealer aligns with expert analysis, adding precision to the claims. However, the story could benefit from more detailed verification of the specific distribution methods of these malware families and the impact on corporate environments.

7
Balance

The article primarily focuses on the threats posed to macOS users, which is a necessary perspective given the topic. However, it lacks a broader discussion on how this trend fits within the larger landscape of cybersecurity across different platforms. The piece could be more balanced by including perspectives from other cybersecurity experts or institutions that might offer differing views on the severity or uniqueness of the threat to macOS compared to other operating systems.

8
Clarity

The article is well-structured, presenting information in a logical sequence that enhances understanding. The language is clear, and technical terms are adequately explained, making it accessible to readers without a deep background in cybersecurity. However, the inclusion of unrelated headlines within the article could confuse readers and detract from the main narrative.

8
Source quality

The article relies on reputable sources such as Palo Alto Networks Unit 42 and cybersecurity expert Eric Schwake, indicating a high level of source quality. These sources are well-regarded in the cybersecurity field, lending credibility to the claims. However, the story could enhance its source quality by incorporating a wider variety of expert opinions or including direct statements from Apple regarding their security measures.

6
Transparency

The article provides a clear narrative on the surge of macOS infostealers but lacks transparency in explaining the methodology behind the reported statistics, such as the 101% increase. It would benefit from more detailed explanations of how data was gathered and analyzed. Additionally, disclosing any potential conflicts of interest from the sources or the publication itself could improve transparency.

Sources

  1. https://www.channele2e.com/brief/infostealers-aimed-at-macos-surges
  2. https://www.tanium.com/blog/cti-roundup-realst-malware-targets-macos-infostealer-malware-sees-exponential-growth/
  3. https://www.trellix.com/blogs/research/macos-malware-surges-as-corporate-usage-grows/
  4. https://www.broadcom.com/support/security-center/protection-bulletin/infostealers-targeting-macos-on-the-rise
  5. https://unit42.paloaltonetworks.com/macos-stealers-growing/